allfro / pymetasploit
A full-fledged msfrpc library for Metasploit framework.
☆300Updated 3 years ago
Alternatives and similar repositories for pymetasploit:
Users that are interested in pymetasploit are comparing it to the libraries listed below
- Created by Jin Qian via the GitHub Connector☆432Updated last year
- Exploits and Security Tools Framework 2.0.1☆305Updated 2 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- A python reverse shell that uses DNS as the c2 channel☆506Updated 9 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆306Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆316Updated 6 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆200Updated 6 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 7 years ago
- A framework for Backdoor development!☆436Updated 7 years ago
- ☆512Updated last year
- First IDE for Nmap Script (NSE) Development.☆356Updated 4 years ago
- DNS-Shell is an interactive Shell over DNS channel☆523Updated 4 years ago
- My collection of metasploit auxiliary post-modules☆190Updated 5 years ago
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆263Updated 7 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆441Updated last year
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆490Updated 3 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 9 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆406Updated 8 years ago
- application server attack toolkit☆685Updated 4 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Stri…☆449Updated 4 years ago
- Specify targets and run sets of tools against them☆389Updated 5 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆332Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆824Updated 7 years ago
- A WebSocket C2 Tool☆392Updated 7 years ago
- Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.☆308Updated 3 years ago
- Search Exploitable Software on Linux☆226Updated last year
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 7 years ago